Type | Year | Title | Cited | Download |
---|---|---|---|---|
Conference
|
2024 | An Integrated Perspective on the Definition of AI Security 진승헌 한국정보기술학회 종합 학술 대회 (추계) 2024, pp.123-126 | ||
Conference
|
2024 | A Study on Mapping Digital Identities between EU and US 진승헌 한국정보기술학회 종합 학술 대회 (하계) 2024, pp.91-95 | ||
Journal
|
2024 | EU eIDAS 2.0 & European Digital Identity Wallet 진승헌 TTA Journal, v.211, pp.90-95 | ||
Conference
|
2023 | Evolution of digital wallets and consideration of security threats 진승헌 한국정보보호학회 학술 대회 (하계) 2023, pp.1-4 | ||
Journal
|
2022 | Review for ID management technology according to Metaverse phase 정수용 정보보호학회지, v.32, no.4, pp.49-59 | ||
Conference
|
2022 | A Study on Metaverse Security Threats 진승헌 한국정보보호학회 학술 대회 (하계) 2022, pp.699-702 | ||
Conference
|
2021 | Major Issues and Implications for 20 Years of Accredited Certificate 진승헌 한국정보기술학회 종합 학술 대회 (추계) 2021, pp.16-20 | ||
Journal
|
2021 | World Without Boundaries and Trends in User Authentication Technology 진승헌 전자통신동향분석, v.36, no.4, pp.135-144 | ||
Conference
|
2021 | Analysis of Digital ID Management Technology Requirements for the Post-COVID-19 Er 진승헌 한국정보기술학회 종합 학술 대회 (하계) 2021, pp.24-28 | ||
Journal
|
2020 | Trends of Digital Identity Technology 진승헌 주간기술동향, v.1975, pp.2-13 | ||
Journal
|
2020 | Is Your Android App Insecure? Patching Security Functions With Dynamic Policy Based on a Java Reflection Technique Sung-Hoon Lee IEEE Access, v.8, pp.83248-83264 | 4 | |
Journal
|
2019 | Mobile Network Security Issues regarding 5G Security 박종근 전자통신동향분석, v.34, no.1, pp.36-48 | ||
Conference
|
2018 | AppWrapper: Patching Security Functions with Dynamic Policy on Your Insecure Android Apps Sung-Hoon Lee International Symposium on Software Reliability Engineering Workshops (ISSREW) 2018, pp.36-41 | 2 | |
Journal
|
2018 | Detection of Spoofing Attacks in Face Recognition 이성훈 주간기술동향, v.1870, pp.17-26 | ||
Conference
|
2018 | Learning based Biometric Key Generation Method using CNN and RNN Jong-hyuk Roh International Conference on Information Technology and Electrical Engineering (ICITEE) 2018, pp.136-139 | 11 | |
Journal
|
2018 | Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment Sung-Hoon Lee Journal of Information Processing Systems, v.14, no.2, pp.523-538 | 9 | |
Journal
|
2018 | Trends in Implicit Continuous Authentication Technology 김승현 전자통신동향분석, v.33, no.1, pp.57-67 | ||
Conference
|
2017 | Appwrapping Providing Fine-Grained Security Policy Enforcement Per Method Unit in Android Sung-Hoon Lee International Symposium on Software Reliability Engineering Workshops (ISSREW) 2017, pp.36-39 | 4 | |
Journal
|
2017 | Constructing a Privacy-Protecting Fingerprint-Template Based on a Combination of Encryption 김형균 한국정보기술학회논문지, v.15, no.10, pp.45-53 | ||
Conference
|
2017 | A Study of Adaptive Feature Subset for Improving Accuracy of Keystroke Dynamics Authentication on Mobile Environment 이성훈 한국정보처리학회 학술 발표 대회 (춘계) 2017, pp.287-290 | ||
Journal
|
2017 | 모바일 보안 관리 기술 소개 및 동향 이성훈 주간기술동향, v.1791, pp.2-12 | ||
Journal
|
2017 | Simplified Small Exponent Test for Batch Verification Jung Yeon Hwang Theoretical Computer Science, v.662, pp.48-58 | 11 | |
Conference
|
2016 | A Study of App Wrapping for Repackaging Android Binary Application 이성훈 한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 | ||
Conference
|
2016 | Efficient Fuzzy Key Extraction Method with Lighted Template 김형균 한국정보보호학회 학술 대회 (동계) 2016, pp.1-4 | ||
Conference
|
2016 | A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment Sung-Hoon Lee World Conference on Information Security Applications (WISA) 2016 (LNCS 10144), v.10144, pp.1-10 | 2 | |
Journal
|
2016 | 핀테크 보안 기술 동향 : 상황 인지 기반 인증 기술 김승현 정보과학회지, v.34, no.4, pp.20-24 | ||
Conference
|
2015 | Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures Jung Yeon Hwang International Conference on Security Standardisation Research (SSR) 2015, v.9497, pp.43-69 | 4 | |
Journal
|
2015 | Customer Data Scanner for Hands-Free Mobile Payment SooHyung Kim IEICE Transactions on Communications, v.E98-B, no.11, pp.2291-2299 | 0 | |
Journal
|
2015 | An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking 이성훈 정보보호학회논문지, v.25, no.4, pp.941-950 | ||
Journal
|
2015 | Study on Fintech Technology and Its Security 이성훈 전자통신동향분석, v.30, no.4, pp.110-119 | ||
Conference
|
2015 | Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy Dae-Yeob Kim International Conference on Mobile Systems and Pervasive Computing (MobiSPC) 2015, pp.88-95 | ||
Conference
|
2014 | Risk of Personal Information for the Sale of Used Goods in the Online 박준범 한국정보처리학회 학술 발표 대회 (추계) 2014, pp.482-485 | ||
Journal
|
2014 | Passwordless Authentication Technology-FIDO 조상래 전자통신동향분석, v.29, no.4, pp.101-109 | ||
Conference
|
2014 | The Effective De-Identification using Quasi-Identifier in the Relational Database 박준범 한국정보보호학회 학술 대회 (하계) 2014, pp.1-4 | ||
Conference
|
2014 | Implementation of TouchSign Offline Digital Signature System 조영섭 대한전자공학회 종합 학술 대회 (하계) 2014, pp.602-605 | ||
Conference
|
2014 | Implementation of TouchSign Online System 김수형 대한전자공학회 종합 학술 대회 (하계) 2014, pp.595-597 | ||
Conference
|
2014 | Implementation of TouchSign Certificate Management System 조상래 대한전자공학회 종합 학술 대회 (하계) 2014, pp.598-601 | ||
Conference
|
2014 | The Research on iBeacon Technology Trend and Issue 김대엽 한국 컴퓨터 종합 학술 대회 2014, pp.390-392 | ||
Conference
|
2014 | Device Control Protocol Using Mobile Phone Jong-hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2014, pp.355-359 | 14 | |
Journal
|
2013 | A Method of Identifying Ownership of Personal Information Exposed in Social Network Service 김석현 정보보호학회논문지, v.23, no.6, pp.1103-1110 | ||
Conference
|
2013 | A Method to Convert Formalized Hangul Name of Informal User Name 김석현 한국정보과학회 학술 발표회 (추계) 2013, pp.799-801 | ||
Conference
|
2013 | Connecting Same ID in the Facebook and Twitter 박준범 한국정보과학회 학술 발표회 (추계) 2013, pp.778-780 | ||
Conference
|
2013 | Privacy Protection Technology for Public Information Open & Sharing 최대선 한국정보과학회 학술 발표회 (추계) 2013, pp.775-777 | ||
Conference
|
2013 | Geo-Location based QR-Code Authentication Scheme to Defeat Active Real-time Phishing Attack Seung-Hyun Kim Workshop on Digital Identity Management (DIM) 2013, pp.51-61 | 9 | |
Conference
|
2013 | Named Entity Recognition with Automatically Gathered Training Data 조진만 한국정보과학회 학술 발표회 (추계) 2013, pp.772-774 | ||
Journal
|
2013 | Personal Information Exposure on Social Network Service 최대선 정보보호학회논문지, v.23, no.5, pp.977-983 | ||
Journal
|
2013 | 금융 기관을 타켓으로 하는 피싱/파밍 공격 기술 동향 김승현 전자공학회지, v.40, no.8, pp.40-48 | ||
Journal
|
2013 | Privacy Risk Analysis of Big Data 최대선 정보보호학회지, v.23, no.3, pp.56-60 | ||
Journal
|
2013 | Active Phishing Attack and Its Countermeasures 김승현 전자통신동향분석, v.28, no.3, pp.9-18 | ||
Journal
|
2013 | Warning System for Detecting Malicious Applications on Android System Sung-Hoon Lee International Journal of Computer and Communication Engineering, v.2, no.3, pp.324-327 | ||
Journal
|
2013 | Mobile Electronic Receipt 김수형 TTA Journal, v.146, pp.57-60 | ||
Journal
|
2012 | Smart Channel : A Method for Processing Transactions in Smartphone for Authentication, Payment and Digital Signature in N-Device Environment 최대선 정보과학회논문지 : 정보통신, v.39, no.6, pp.506-513 | ||
Conference
|
2012 | A Study on Audio Security Storage System and Method for Managing Certificate Using this System 김석현 한국인터넷정보학회 학술 발표 대회 (추계) 2012, pp.141-142 | ||
Journal
|
2012 | Survey of the Technologies for Collection of PII 김승현 전자통신동향분석, v.27, no.4, pp.130-137 | ||
Conference
|
2012 | User Movement Behavior Analysis using the Environment Information 노종혁 한국통신학회 종합 학술 발표회 (하계) 2012, pp.321-322 | ||
Journal
|
2012 | 사용자 동의없는 개인정보 수집기술 동향 김승현 주간기술동향, v.1544, pp.1-14 | ||
Conference
|
2012 | Personalized Advertisement Recommendation System based on User Profile in the Smart Phone Jong-Hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2012, pp.1300-1303 | ||
Journal
|
2012 | Platform-Independent Security Framework for Application Security on Smartphone Environment 최대선 정보과학회논문지 : 정보통신, v.39, no.1, pp.102-107 | ||
Conference
|
2011 | Study of Securing Permission about Android Applications 이성훈 한국정보보호학회 충청 지부 학술 대회 2011, pp.1-8 | ||
Journal
|
2011 | VRM 관련 오픈소스 프로젝트 동향 김승현 정보보호학회지, v.21, no.4, pp.47-56 | ||
Journal
|
2011 | ID 관리 기술 및 시장 동향 조영섭 정보보호학회지, v.21, no.4, pp.62-68 | ||
Journal
|
2011 | ID 관리 기술 국제표준화 동향 및 향후 전망 조상래 정보보호학회지, v.21, no.4, pp.14-21 | ||
Conference
|
2011 | Bar-Code Waybill of Personal Information is Encrypted 김석현 한국정보처리학회 학술 발표 (춘계) 2011, pp.836-839 | ||
Conference
|
2011 | A Study on an Alternation of RNN and Access Control for Offline Environments by using I-PIN 김승현 한국정보처리학회 학술 발표 (춘계) 2011, pp.840-843 | ||
Journal
|
2011 | ITU-T SG17 ID 관리 국제표준화 동향 및 향후 전망 조상래 정보보호학회지, v.21, no.2, pp.70-77 | ||
Conference
|
2011 | Human Verifiable Authentication Schemes Geared to Smart Wallet Applications Gun Il Ma International Conference on Consumer Electronics (ICCE) 2011, pp.141-142 | 1 | |
Journal
|
2011 | VRM: 사용자 중심의 고객관계관리(CRM) 김승현 주간기술동향, v.1480, pp.1-12 | ||
Conference
|
2010 | A Personalized Music Recommendation Service in Mobile Environment Jong-Hyuk Roh International Conference on Internet (ICONI) 2010 / Asia Pacific International Conference on Information Science and Technology (APIC-IST) 2010, pp.1-2 | ||
Conference
|
2010 | Shoulder-Surfing Resistant User Authentication Method Based on PIN and Pattern Image 김영삼 한국정보처리학회 학술 대회 (추계) 2010, pp.1138-1141 | ||
Conference
|
2010 | SRS-based Automatic Secure Device Pairing on Audio Channels Young Sam Kim International Conference for Internet Technology and Secured Transactions (ICITST) 2010, pp.1-6 | ||
Conference
|
2010 | Gatekeeper Seung-Hyun Kim Workshop on Digital Identity Management (DIM) 2010, pp.59-62 | 0 | |
Conference
|
2010 | Study on HCI Authentication Technologies Can be Applied to the Smartphone Environment 김석현 한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2 | ||
Conference
|
2010 | Personalized Service Recommendation System in Mobile Environment 노종혁 한국인터넷정보학회 학술 발표 대회 (추계) 2010, pp.1-2 | ||
Journal
|
2010 | Personalized EigenTrust with the Beta Distribution Daeseon Choi ETRI Journal, v.32, no.2, pp.348-350 | 14 | |
Conference
|
2010 | Accountable Privacy Based on Publicly Verifiable Secret Sharing Young Sam Kim International Conference on Advanced Communication Technology (ICACT) 2010, pp.1583-1586 | ||
Conference
|
2010 | A Concept of Interoperable Authentication Framework for Dynamic Relationship in Identity Management Seung-Hyun Kim International Conference on Advanced Communication Technology (ICACT) 2010, pp.1635-1639 | ||
Journal
|
2009 | 모바일 ID 보안 및 프라이버시를 위한 스마트지갑 최대선 정보과학회지, v.27, no.12, pp.50-59 | ||
Journal
|
2009 | Digital Identity Interchange Gateway Technology for Mobile Services 조상래 전자통신동향분석, v.24, no.5, pp.133-142 | ||
Journal
|
2009 | 모바일 ID관리와 스마트지갑 최대선 주간기술동향, v.1415, pp.14-28 | ||
Conference
|
2009 | Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information Seung Hyun Kim International Conference on Security and Management (SAM) 2009, pp.457-462 | ||
Conference
|
2009 | Identity Data Security System for the Digital Identity Wallet Dae Seon Choi International Conference on Advanced Communication Technology (ICACT) 2009, pp.1678-1681 | ||
Journal
|
2009 | 해외의 대규모 OpenID 도입 사례 김승현 주간기술동향, v.1384, pp.1-14 | ||
Conference
|
2009 | Personal Information Management using Attribute Provider Jong Hyuk Roh International Conference on Advanced Communication Technology (ICACT) 2009, pp.1293-1295 | ||
Journal
|
2008 | A Digital Identity Interchange Framework for User-Centric ID Management 조상래 전자통신동향분석, v.23, no.6, pp.102-111 | ||
Conference
|
2008 | A User-centric Federated Single Sign-on System using Mobile Device and Temporary Identification 정관수 정보통신분야학회 합동 학술 대회 2008, pp.1-4 | ||
Conference
|
2008 | A Simple SNMP Authentication Method for Ad-hoc Networks Hyun Kyung Oh International Conference on Convergence and Hybrid Information Technology (ICCIT) 2008, pp.555-558 | 1 | |
Conference
|
2008 | i-PIN(internet Personal Identification Number) extension services using the Identity Selector 김승현 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1477-1480 | ||
Conference
|
2008 | A Relay Technique to interoperate between i-PIN(internet Personal Identification Number) services 김승현 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1481-1484 | ||
Conference
|
2008 | A Method for User Authentication using One-time Identification Information and Mobile Device 정관수 한국통신학회 종합 학술 발표회 (추계) 2008, pp.691-694 | ||
Journal
|
2008 | Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks Dae Seon Choi IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 | 1 | |
Conference
|
2008 | Mobile Digital Identity Wallet 김수형 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1489-1492 | ||
Conference
|
2008 | Data Sharing in the Digital Identity Wallet 노종혁 한국정보처리학회 학술 발표 대회 (추계) 2008, pp.1521-1524 | ||
Journal
|
2008 | 피싱과 안티피싱 기술의 동향 김덕진 주간기술동향, v.1362, pp.1-12 | ||
Journal
|
2008 | 디지털 ID 관리 기술 동향 및 전망 조영섭 인터넷정보학회지, v.9, no.3, pp.14-24 | ||
Journal
|
2008 | Electronic Identity Wallet System to Provide User-Centric ID Management Facilities 조영섭 전자통신동향분석, v.23, no.4, pp.10-18 | ||
Journal
|
2008 | 인터넷 개인 정보 유출과 전자ID지갑 최대선 주간기술동향, v.1359, pp.10-23 | ||
Conference
|
2008 | Website Registration using Link for Privacy Jong-Hyuk Roh International Conference on Security and Management (SAM) 2008, pp.1-3 | ||
Journal
|
2008 | 국내외 ID 관리 기술 표준화 동향 조상래 주간기술동향, v.1355, pp.13-25 | ||
Conference
|
2008 | Decision Assistant Model for the Identity Selector in User-Centric IdM Seung-Hyun Kim International Conference on Security and Management (SAM) 2008, pp.1-7 | ||
Journal
|
2008 | 사용자 중심의 ID관리 프로젝트 동향 김승현 주간기술동향, v.1354, pp.1-13 | ||
Conference
|
2008 | The Security Limitations of SSO in OpenID Hyun-Kyung Oh International Conference on Advanced Communication Technology (ICACT) 2008, pp.1608-1611 | 30 | |
Conference
|
2008 | A User Friendly Internet Identity Management System Dae Seon Choi International Conference on Advanced Communication Technology (ICACT) 2008, pp.1163-1166 | 2 | |
Conference
|
2008 | Context-Aware Service System Architecture based on Identity Interchange Layer Soo-Hyung Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1482-1486 | 1 | |
Conference
|
2008 | Personalized Identity Agent for User-Centric IdM Seung-Hyun Kim International Conference on Advanced Communication Technology (ICACT) 2008, pp.1308-1313 | 2 | |
Journal
|
2007 | Policy Based Privacy Technology in Web Environment 노종혁 전자통신동향분석, v.22, no.4, pp.144-155 | ||
Journal
|
2007 | Privacy Controller using XACML for Internet Identity Management System 노종혁 한국통신학회논문지 B : 네트워크 및 서비스, v.32, no.7, pp.438-447 | ||
Journal
|
2007 | url-based Identity Management 기술 동향 최대선 주간기술동향, v.1303, pp.12-24 | ||
Journal
|
2007 | 오픈소스 ID관리 프로젝트 동향 김승현 주간기술동향, v.1301, pp.1-10 | ||
Conference
|
2007 | Trust Management for User-Centric Identity Management on the Internet Dae Seon Choi International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 | 2 | |
Conference
|
2007 | Identity Roaming Mechanism for Multiple Trust Domains using SAML v2.0 and Single Federation Bridge Sang Rae Cho International Symposium on Consumer Electronics (ISCE) 2007, pp.1-4 | 1 | |
Conference
|
2007 | The Weakness Analysis of User-centric based Identity Management System 오현경 한국인터넷정보학회 학술 발표 대회 (춘계) 2007, pp.123-127 | ||
Conference
|
2007 | Design and Implementation of Mobile User Agreement Service Seung-Hyun Kim International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 | 0 | |
Journal
|
2007 | Technologies for Identity Metasystem 김수형 전자통신동향분석, v.22, no.3, pp.144-153 | ||
Conference
|
2007 | Video-on-Demand Streaming in P2P Environment Jong-Hyuk Roh International Symposium on Consumer Electronics (ISCE) 2007, pp.1-5 | 3 | |
Journal
|
2007 | Overview and Comparison of Internet Identity Management System 조영섭 전자통신동향분석, v.22, no.3, pp.136-143 | ||
Conference
|
2007 | A Unified User Consent Acquisition and Delivery Mechanism for Multi-Source User Data Integrated Service Young Seob Cho International Symposium on Consumer Electronics (ISCE) 2007, pp.1-7 | 0 | |
Conference
|
2007 | Usability Enhanced Privacy Protection System Based on Users' Responses Han-Gyu Ko International Symposium on Consumer Electronics (ISCE) 2007, pp.1-6 | 4 | |
Journal
|
2007 | ID Management Technology and Standards 조영섭 정보과학회지, v.25, no.5, pp.22-28 | ||
Conference
|
2007 | Security-Enhanced Callback URL Service in Mobile Device Seung-Hyun Kim International Conference on Advanced Communication Technology (ICACT) 2007, pp.1500-1504 | 3 | |
Conference
|
2007 | The Real-Time User Consent Acquisition System for Secure Use of Personal Information Han Gyu Ko International Conference on Advanced Communication Technology (ICACT) 2007, pp.1343-1346 | 1 | |
Journal
|
2007 | Trend of Technology for Digital Identity Management 조영섭 전자통신동향분석, v.22, no.1, pp.1-10 | ||
Conference
|
2006 | Effective E-mail Address Anonymization System using Identity Service Provider Hangyu Ko International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 | ||
Journal
|
2006 | 인터넷 환경의 사용자 중심 ID 관리 시스템 연구 동향 이형효 정보과학회지, v.24, no.12, pp.92-98 | ||
Conference
|
2006 | Identity Centric Management of Distributed User Created Content Dae Seon Choi International Ubiquitous Convergence Conference (IUC) 2006, pp.1-5 | ||
Journal
|
2006 | 신원도용(Identity Theft) 대응 기술 동향 진승헌 주간기술동향, v.1264, pp.1-13 | ||
Journal
|
2006 | 인터넷 서비스 환경의 고도화와 디지털 ID 관리 기술 진승헌 주간기술동향, v.1261, pp.24-33 | ||
Journal
|
2006 | Web 2.0과 URL기반의 ID관리 기술 조상래 주간기술동향, v.1260, pp.1-12 | ||
Journal
|
2006 | 인터넷 환경에서 데이터 공유를 위한 새로운 식별체계 동향 조상래 주간기술동향, v.1255, pp.1-13 | ||
Journal
|
2006 | Internet ID Management System based on ID Federation: e-IDMS 조영섭 전자공학회논문지 TC, v.43, no.7, pp.104-114 | ||
Conference
|
2006 | E-mail Address Anonymization Service using Identity Service Provider 고한규 한국통신학회 종합 학술 발표회 (하계) 2006, pp.1535-1538 | ||
Conference
|
2006 | Web Service Framework for Identity Information Sharing 조영섭 대한전자공학회 종합 학술 대회 (하계) 2006, pp.427-428 | ||
Conference
|
2006 | Grid ID Management based on Distributed Agents using SPML Seung Hyun Kim International Symposium on Consumer Electronics (ISCE) 2006, pp.604-609 | 0 | |
Conference
|
2006 | The Identity Web : Trend and Security Requirements 조상래 대한전자공학회 종합 학술 대회 (하계) 2006, pp.435-436 | ||
Journal
|
2006 | 유럽의 eID 기술 동향 김승현 주간기술동향, v.1251, pp.1-25 | ||
Conference
|
2006 | A Personal Information Leakage Prevention Method on the Internet Dae Seon Choi International Symposium on Consumer Electronics (ISCE) 2006, pp.646-650 | 4 | |
Journal
|
2006 | OASIS SAML(Security Assertion Markup Language) v2.0 고찰 및 응용 조영섭 한국멀티미디어학회지, v.10, no.1, pp.59-70 | ||
Conference
|
2006 | A Method for Preventing the Leakage of the Personal Information on the Internet Dae Seon Choi International Conference on Advanced Communication Technology (ICACT) 2006, pp.1195-1198 | 4 | |
Journal
|
2006 | Key Management Scheme for Providing the Confidentiality in Mobile Multicast 노종혁 정보보호학회지, v.16, no.1, pp.97-104 | ||
Conference
|
2006 | Virtual Route Scheme for Preventing Authentication Bypass in the WWW Environment Seung Hyun Kim International Conference on Advanced Communication Technology (ICACT) 2006, pp.822-827 | 1 | |
Conference
|
2006 | Topology-Aware Key Management Scheme for Secure Overlay Multicast Jong-Hyuk Roh International Conference on Information Networking (ICOIN) 2006 (LNCS 3961), v.3961, pp.733-742 | 0 | |
Conference
|
2005 | Federation Protocol Translation Service in Heterogeneous Federation Environments 김승현 한국정보보호학회 학술 대회 (동계) 2005, pp.1-4 | ||
Conference
|
2005 | Consideration of the Compatible Federation Protocols in Heterogeneous Federation Environments 김승현 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.8-12 | ||
Conference
|
2005 | Liberty ID-WSF Technology for Identity Web Service 조영섭 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.323-327 | ||
Conference
|
2005 | Key Tree Management for Providing the Confidentiality in Overlay Multicast 노종혁 한국정보보호학회 학술 대회 (동계) 2005, pp.1-5 | ||
Conference
|
2005 | A Technique for Blocking Personal Information Leakage in the Internet 최대선 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.356-359 | ||
Conference
|
2005 | Privilege Delegation Technology using a Delegation Assertion based on Identity Federation 조상래 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.350-352 | ||
Conference
|
2005 | Key Management Scheme for Application Layer Multicast 노종혁 차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.364-368 | ||
Conference
|
2005 | Key Management Scheme for Secure Overlay Multicast 노종혁 한국통신학회 종합 학술 발표회 (추계) 2005, pp.775-778 | ||
Conference
|
2005 | Key Management Scheme for Secure Mobile Multicast 노종혁 한국정보과학회 학술 발표 (추계) 2005, pp.106-108 | ||
Journal
|
2005 | 편리하고 안전한 인터넷 이용을 위한 ID 관리 서비스 진승헌 ETRI CEO Information, v.알수없음, no.31, pp.1-19 | ||
Journal
|
2005 | Design and Implementation of Scalable ID Federation System in Mobile Computing Environments 유인태 인터넷정보학회논문지, v.6, no.5, pp.155-166 | ||
Journal
|
2005 | Privacy Authorization for Internet Identity Management System 노종혁 한국통신학회논문지, v.30, no.10B, pp.648-659 | ||
Journal
|
2005 | Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network Seung Hun Jin ETRI Journal, v.27, no.4, pp.465-468 | 38 | |
Journal
|
2005 | Internet Identity Management Service 최대선 전자통신동향분석, v.20, no.1, pp.73-83 | ||
Conference
|
2004 | Multicast in Mobile Network 노종혁 차세대 통신소프트웨어 학술 대회 (NCS) 2004, pp.745-748 | ||
Journal
|
2004 | 인터넷 ID 관리 서비스 기술 동향 김승현 주간기술동향, v.1160, pp.1-7 | ||
Journal
|
2004 | 인터넷 ID 관리 서비스 최대선 정보보호학회지, v.14, no.5, pp.32-43 | ||
Conference
|
2004 | Authentication and Authorization Service for Network Security System 김태성 한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1137-1140 | ||
Journal
|
2004 | Self-Reputation System in P2P Networks 조남수 정보보호학회논문지, v.14, no.2, pp.35-47 | ||
Journal
|
2004 | 유비쿼터스 컴퓨팅과 보안요구사항 분석 조영섭 정보보호학회지, v.14, no.1, pp.21-34 | ||
Conference
|
2003 | Certificate Status Check for Verifying Signature 노종혁 한국통신학회 종합 학술 발표회 (추계) 2003, pp.588-591 | ||
Journal
|
2003 | Design of Privilege Delegation Mechanism using Proxy Certificate 진승헌 정보처리학회논문지 C, v.10C, no.6, pp.739-746 | ||
Conference
|
2003 | A Location Privacy Protection Mechanism for Smart Space Yeong Sub Cho International Workshop on Information Security Applications (WISA) 2003 (LNCS 2908), v.2908, pp.162-173 | 5 | |
Conference
|
2003 | On Modeling System-centric Information for Role Engineering Dong Wan Shin Symposium on Access Control Models and Technologies (SACMAT) 2003, pp.169-178 | 17 | |
Journal
|
2003 | 정보 보호 관련 법규 동향 이대기 전자공학회지, v.30, no.6, pp.87-96 | ||
Conference
|
2003 | Research for Implementation of Licensed Web SSO 최대선 한국정보과학회 학술 발표 (봄) 2003, pp.452-454 | ||
Conference
|
2003 | Certificate-based Digital Library Authentication and Authorization Architecture 원형석 한국정보과학회 학술 발표 (봄) 2003, pp.494-497 | ||
Journal
|
2003 | ID-based Proxy Signature Scheme from the Bilinear Map 이정연 정보보호학회논문지, v.13, no.2, pp.3-11 | ||
Conference
|
2003 | A role administration system in role-based authorization infrastructures Dong Wan Shin Symposium on Applied Computing (SAC) 2003, pp.325-330 | 0 | |
Conference
|
2002 | A study on a digital library authentication and authorization architecture 원형석 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1103-1106 | ||
Conference
|
2002 | Validating Certificate of Certificate Validation Server 노종혁 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.913-916 | ||
Conference
|
2002 | A SAML-based SSO and B2B 진승헌 한국정보처리학회 학술 발표 대회 (추계) 2002, pp.961-964 | ||
Conference
|
2002 | Design & Implementation of Binding method for PKC & AC 진승헌 한국정보과학회 학술 발표 (가을) 2002, pp.679-681 | ||
Conference
|
2002 | TSP SDK Implementation 원형석 한국정보과학회 학술 발표 (가을) 2002, pp.589-591 | ||
Journal
|
2002 | 통합 어플리케이션 정보보호 기반구조 최대선 정보보호학회지, v.12, no.5, pp.27-35 | ||
Conference
|
2002 | Proxy Signature Technology using Proxy Certificate 조상래 한국정보과학회 학술 발표 (가을) 2002, pp.676-678 | ||
Conference
|
2002 | Building Certification Paths in Certificate Validation Server 노종혁 한국정보과학회 학술 발표 (가을) 2002, pp.604-606 | ||
Conference
|
2002 | The Design of Integrated Cryptographic API 김태성 한국정보과학회 학술 발표 (가을) 2002, pp.505-507 | ||
Conference
|
2002 | Introduction of ETRI Privilege Management Infrastructure 김희선 한국정보과학회 학술 발표 (가을) 2002, pp.607-609 | ||
Conference
|
2001 | Collaborative VA Model 노종혁 한국정보과학회 학술 발표 (가을) 2001, pp.751-753 | ||
Conference
|
2001 | The Mechanism of Certification Path Validation 김태성 한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934 | ||
Journal
|
2001 | 국내외 전자 서명 및 인증 제도 동향 분석 이대기 정보보호학회지, v.11, no.4, pp.44-60 | ||
Conference
|
2001 | Attribute Certificate and PMI Model 조영섭 한국통신학회 종합 학술 발표회 (하계) 2001, pp.1933-1936 | ||
Journal
|
2000 | Attribute Certification Technology and PMI 진승헌 정보보호학회지, v.10, no.4, pp.33-40 |